Modeling Web Proxy Cache Architectures

Size: px
Start display at page:

Download "Modeling Web Proxy Cache Architectures"

Transcription

1 Modeling Web Proxy Cache Architectures Christoph Lindemann und Andreas Reuys, Universität Dortmund, Informatik IV, Rechnersysteme und Leistungsbewertung, August-Schmidt-Str. 12, Dortmund, Germany, {cl, Martin Reiser, GMD Institut für Medienkommunikation, Schloß Birlinghoven, Postfach 1316, Sankt Augustin, Germany, Abstract In this paper we evaluate the performance of design alternatives for Web proxy cache architectures. Our performance study employs deterministic and stochastic Petri nets (DSPN) as stochastic modeling formalism because DSPN provide an illustrative graphical representation. The presented DSPN models address in particular the sensitivity of the performance of proxy cache architectures on the traffic intensity and burstiness of client requests as well as on the cache size and network transfer times. We employ DSPN for a comparative performance study of two Web proxy cache architectures: a shared proxy cache and a partitioned proxy cache for text and image documents. For comparison and validation purpose, we also present performance figures for a simple Web server without a proxy cache. For both cache architectures, the benefits of prefetching are also investigated. 1. Introduction Due to the phenomenal growth of the World Wide Web, a considerable number of related performance problems are currently being investigated in research activities. The overall performance of the Web is determined by the performance of individual components that build the Web, i.e., the traffic characteristics of client requests, the performance of servers and proxy servers, and the network latency. Since the majority of Web documents are static documents (i.e., text, image, audio and video files), caching at various network points appears very promising for reducing Web traffic and end user latency. A common way of web caching constitutes caching in the network itself by means of so-called Web proxy servers. Such proxy servers are intermediateries between browsers of clients and Web servers of the internet. Previous performance studies of Web proxy server caching have mostly focussed on replacement policies and have been conducted by trace-driven simulation (see e.g., [2], [3], [13]). Performing such a simulation study yields accurate quantitative results for a particular workload, though, requires substantial effort for collecting the traces and implementing the simulation model. While such simulation studies are surely needed in late system design cycles, a considerable number of performance problems of early design stages can effectively be answered with stochastic performance models. Such high-level stochastic models for evaluating design alternatives of Web proxy server architectures may well be used instead of or in conjunction with trace-driven simulation. Deterministic and stochastic Petri nets (DSPN) are a high-level modeling formalism for the specification of discrete-event systems with exponential and deterministic events. The offered traffic is typically stochastic (i.e., bursty and heavytailed [4]) in the internet, whereas for a given document class (e.g., text or images) the transfer times are constant. Consequently, the combination of stochastic and deterministic timing in one model is of particular practical relevance for Web server performance analysis. Since DSPN constitute a graphical modeling formalism, the development and validation of a DSPN is considerably easier and less error-prone than writing and debugging code for a trace-driven simulation study. Due to the same reason, the employment of DSPN is superior to the usage of low-level analytical models (e.g., Markov chains), for which mathematical equations have to be developed in order to determine their solution. Furthermore, highly efficient numerical methods are available for cost-effective quantitative performance analysis [9]. Thus, DSPN are attractive in early system design stages. This paper presents a performance study of design alternatives for Web proxy cache architectures. The main goal of this work constitutes the development of sufficiently accurate high-level stochastic models that can be utilized for cost-effective support of quantitative design of Web server architectures. The DSPN take into account the burstiness and selfsimiliarity of the arrival process of client requests observed in [13]. The presented performance study addresses in particular the sensitivity of the average latency for retrieving a document on the traffic intensity and burstiness of client requests as well as on the cache size and network bandwidth. We employ DSPN for a comparative performance study

2 of two Web proxy cache architectures: a shared cache versus a partitioned cache for text and image documents. For both cache architectures, the benefits of prefetching is also investigated. For comparison and validation purpose, we also present performance figures for a simple Web server without a proxy cache. For a comparative performance study of the two Web proxy server cache architectures without prefetching, we show that the DSPN modeling approach lead to the same results as the trace-driven simulation study [13]. However, the analysis of the presented DSPN requires only a few minutes of CPU time on a modern workstation. To the best of our knowledge, the performance of prefetching combined with a partitioned Web proxy server cache is studied for the first time in this paper. The remainder of this paper is organized as follows. Section 2 recalls the building blocks of DSPN and describes the software architecture and the graphical user interface of DSPNexpress The Web proxy cache architectures and its DSPN models are introduced in Section 3. Section 4 presents performance curves for these proxy cache architectures with and without prefetching. The final section contains concluding remarks. 2 The DSPN Modeling Approach fire after an exponentially distributed delay with given mean has elapsed. Deterministic transitions drawn as black bars, which fire after a given constant delay. The firing of an immediate transition has priority of the firing of any timed transition. Firing weights are associated with immediate transitions in order to determine the probability of firing, if in a marking several immediate transitions are in conflict. Firing delays of exponential and deterministic transitions as well as firing weights of immediate transitions may depend on the current marking of the DSPN; i.e., they may be marking-dependent. An important case of marking-dependency constitutes the infiniteserver firing semantics [9]. That is, the firing semantics of some exponential transition with a single input place is such that, if several tokens reside in its input place, each token represents an activity that proceeds concurrently to the others. Since this kind of marking-dependency models delays without queueing, the exponential transition is said to have infinite-server firing semantics. For a comparative performance analysis of Web proxy server cache architectures, we present DSPN models for different architectures in the third section. The DSPN explicitly represents the traffic intensity and burstiness of client requests as well as on the cache size and illustrate the performance gain due to utilizing a partitioned cache for text and image documents and due to prefetching. 2.1 The Building Blocks of DSPN Formally, a Petri net is a directed bipartite graph with one set of vertices called places (drawn as circles) and the other called transitions (drawn as bars). Places may contain tokens which are drawn as dots or numbers. Places and transitions are connected by directed arcs. Arcs are distinguished in ordinary arcs (drawn with arrow heads) and inhibitor arcs (drawn with empty circle heads). Arcs may also be labeled with integer numbers denoting their multiplicity. The default multiplicity of an arc is one. A transition is said to be enabled, if all of its input places contain at least as many tokens as the multiplicity of the corresponding input arc and all of its inhibitor places contain less tokens than the multiplicity of the corresponding inhibitor arc. A transition fires by removing from each input place as many tokens as the multiplicity of the corresponding input arc, and by adding to each output place as many tokens as the multiplicity of the corresponding output arc. In DSPN, three types of transitions exist: Immediate transitions drawn as thin bars which fire without delay. Exponential transitions drawn as empty bars, which 2.2 The Software Architecture of the Numerical Solvers The core of the package DSPNexpress constitutes the solution engine for discrete-event stochastic systems with exponential and deterministic events. The software architecture of this solution engine and its software modules are shown in Figure 1. The solution engine is drawn as the big white rectangular box. The six software modules are drawn as rectangles. These software modules are invoked from the solution engine as UNIX processes. Interprocess communication with sockets drawn as broken ellipses is employed for passing intermediate results from one module to the next. Steady state analysis of DSPNs without concurrent deterministic transitions relies on analysis of an embedded Markov chain (EMC) underlying such DSPNs [1]. To efficiently derive the probability matrix of this EMC, the concept of a subordinated Markov chain (SMC) was introduced. Recall that a SMC associated with a state s i is a CTMC whose states are given by the transitive closure of all states reachable from s i via the occurrence of exponential events [9]. After generating the reachability graph

3 DSPN Specification File Structural DSPN Results DES Specification File State Probabilities of DES Result Measures Throughput Values Marking Probabilities Solution Engine for Discrete-Event Stochastic Systems (DES) with Exponential and Deterministic Events Structural Petri Net Analysis Derive Tangible Reachability Graph Reachability Graph Derive Subordinated Markov Chains QMATRIX<1> QMATRIX<K> Derive EMC Derive GSSMC PMATRIX<1> PMATRIX<K> Solve Linear System Solve Volterra Equations State Probabilities Derive DSPN Results CMATRIX<1> CMATRIX<K> PMATRIX<0> Figure 1. The solver architecture for DSPNs CMATRIX<0> comprising of tangible markings (states) of the DSPN, for each state the generator matrix of its SMC is derived. These tasks are performed in the modules Derive Tangible Reachability Graph and Derive Subordinated Markov Chains, respectively. Entries of this probability matrix are computed by transient analysis of the SMCs. Subsequently, a linear system corresponding to the stationary equations of the EMC is solved. These task are performed in the submodules Derive EMC and Solve Linear System. Transient analysis of DSPNs is based on the analysis of a general state space Markov chain (GSSMC) embedded at equidistant time points nd (n = 0,1,2,...) of the continuous-time marking process. The Chapman Kolmogorov equations of the GSSMC constitute a system of Volterra integral equations [11]. Steady state analysis of DSPNs with concurrent deterministic transitions relies on the same approach [10]. The transition kernel of the GSSMC specifies one-step jump probabilities from a given state at instant of time nd to all reachable new states at instant of time (n+1)d. Key drivers for the computational efficiency of the GSSMC approach constitute the separability and piece-wise continuity of the transition kernel [11]. Furthermore, the elements of the transition kernel can effectively be determined by an extension of the concept of subordinated Markov chains. Numerical computation of kernel elements relies also on transient analysis of these CTMCs. This task is performed in submodule Derive GSSMC. Subsequently, for transient analysis a number of iterations corresponding to the mission time are performed on the system of Volterra equations [11] whereas for steady state analysis a linear system is solved for each mesh point [9], [10]. This task is performed in the submodule Solve Volterra Equations. We would like to point out that only the front end and the back end of the solution engine is tailored to DSPNs. That is instead of a DSPN specification file provided by the graphical interface of DSPNexpress, a specification file of an arbitrary discrete-event stochastic system with exponential and deterministic events (e.g., finite state machines) could be quantitatively evaluated by the solution engine of DSPNexpress using an appropriate filter. Figure 2. The graphical user interface

4 2.3 The Graphical User Interface Of course, the package DSPNexpress also provides a user-friendly graphical interface running under X11. To illustrate the features of this graphical interface, consider the snapshot shown in Figure 2. The first line displays the name of the package DSPNexpress and the actual version 2.000, the affiliation of the authors, University of Dortmund, Computer Systems and Performance Evaluation Group, and the year of release A DSPN of one of the following proxy architectures is displayed. Recall that in DSPNs three types of transitions exist: immediate transitions drawn as thin bars fire without delay, exponential transitions drawn as empty bars fire after an exponentially distributed delay whereas deterministic transitions drawn as black bars fire after a constant delay. At any time, DSPNexpress provides on-line helpmessages displayed in the third line of the interface. The command line and the object line are located on the left side of the interface. The buttons are located in a vertical line between the on-line help line and the working area. The working area constitutes the remaining big rectangle which contains the graphical representation of the DSPN. This DSPN is displayed with the options tags on. Thus, each place and each transition of this DSPN is labeled (e.g., Client, Hit, Miss, Queue, etc.). A detailed description of the features of the graphical interface is given in [9]. 3 The Considered Web Proxy Cache Architectures 3.1 Introduction to Web Proxy Caching The purpose of Web proxy servers lies in resolving client requests for Web documents. Proxy servers are dedicated computers typically located in routers of a local area network or an intranet [12]. Requests from clients enter the Web proxy server whose cache should hold most-sought documents. If a copy of the requested document resides in the proxy cache, a cache hit occurs. Otherwise, we say a cache miss occurs. In this case the proxy server establishes a HTTP connection to the originating Web server given in the URL of the requested document and retrieves the document. Subsequently, the requested document is stored in the proxy cache and returned to the requesting client. Figure 3 illustrates the main steps of a transaction of the hypertext transfer protocol (HTTP). For a detailed discussion on Web proxy servers and HTTP, we refer to the recent texts [12], [14]. Important quantities for minimizing the end user latency constitute the hit ratio in the proxy cache and the mean document transfer time. Latency for cache hit send request hit in proxy cache send request to server Latency for cache miss send document to proxy transfer document from proxy to client LAN Internet Client Proxy Server Remote Web Server Figure 3. An HTTP transaction via a Web proxy server

5 Clients K Generation of request Bursty traffic Hit in proxy cache Queued requests Miss in proxy cache Is text Delay for downloading a text Download text Network idle Download image Switch to bursty traffic N Normal traffic Transfer from proxy to client Switch to normal traffic Image buffer Reply to client M Text buffer Is image 3 3 Delay for downloading an image Replace image with image Replace text with image Insert image in cache Insert text in cache Replace image with text Replace text with text Figure 4. DSPN of a proxy server architecture with a shared cache 3.2 Shared Proxy Cache Figure 4 shows the DSPN of a proxy server architecture with a shared cache for text and image documents. We assume that client requests are generated according to a Markov modulated Poisson process (MMPP) whose governing continuous-time Markov chain comprises of N+1 states. In the DSPN, the firing delay of the exponential transition Generation of requests depends on the distribution of the N tokens among the places Bursty traffic and Normal traffic. When all N tokens reside in place Normal traffic, requests are generated according to a Poisson process whose parameter is given in Table 1. For other distributions of these N tokens, requests are generated according to a Poisson process with different parameters.thus, the DSPN explicitly represent the burstiness and self-similiarity in the arrival process for Web document requests as observed from measured data see e.g., [4], [13]. To take into account that client generates requests independently from each other, the exponential transition Generation of requests has infinite-server firing policy. Parameter Base Value Number of clients, K 50 Total size of Proxy cache, M 50 Size of a text document 1 Size of an image document 3 Percentage of requests for text documents 33.3 % Percentage of requests for image documents 66.6 % Mean time for generating requests in normal mode 60 Mean time spent in normal mode 60 Degree of burstiness 5/1 Burst frequency 1/10 Network transfer time for a text document 5 Network transfer time for an image document 15 Table 1. Base parameter setting of the DSPN

6 Download document Allocate bandwidth 3 Delay for downloading documents Insert in proxy cache 3 Download completed Aging delay Clients K Generation of request Bursty traffic Hit in proxy cache Queued requests Miss in proxy cache Is text Download text Network idle Download image Prefetched Delay for downloading a text Switch to bursty traffic N Normal traffic Transfer from proxy to client Switch to normal traffic Image buffer Reply to client M Text buffer Is image 3 3 Delay for downloading an image Replace image with image Replace text with image Insert image in cache Insert text in cache Replace image with text Replace text with text Figure 5. DSPN of a proxy server architecture with shared cache and prefetching Probabilities for hits and misses in the proxy cache (i.e., the probabilities for resolving the conflict between the immediate transitions Hit in proxy cache and Miss in proxy cache) depend on the number of documents currently cached. In the DSPN for a shared proxy cache shown in Figure 4 that is the number of tokens in the places Text buffer and Image buffer. These marking-dependent probabilities are determined according to [2]. The deterministic transitions Delay for dowloading a text and Delay for dowloading an image have associated markingdependent delays in order to approximately represent the concurrent transmission of multiple documents. Table 1 states the model parameters of the DSPN shown in Figures 4, 5 and 6, which underlie the performance experiments presented in Section 4. As basic units for time and size, we choose 1 second and 10 KByte. 3.3 Shared Proxy Cache with Prefetching To reduce latency in computer systems, prefetching of data is widely known and has been employed in different areas. A preliminary study on how to utilize prefetching for Web documents has been studied in [7], [8]. In this and the subsequent section, we are modeling the combination of caching and prefetching in order to investigate its implications to shared and partitioned proxy caches. Figure 5 shows the DSPN of a shared proxy cache architecture in which documents are prefetched when the network traffic is smaller than a threshold value. The gain of prefetching is a higher probability for a hit in the proxy cache whereas the cost for a cache miss is also greater. This is due to the fact that prefetching documents uses additional

7 Clients K Generation of request Bursty traffic Hit in proxy cache Queued requests Miss in proxy cache Is text Delay for downloading a text Download text Network idle Download image Switch to bursty traffic Switch to normal traffic Is image Delay for downloading an image N Normal traffic Transfer from proxy to client Reply to client Replace image with image Insert image in cache Insert text in cache Replace text with text Figure 6. DSPN of a proxy server architecture with partitioned cache network bandwidth. This is encoded in the DSPN of Figure 5 as follows: when the place Prefetched holds a token, the immediate transition Hit in proxy cache has a higher firing probability than the corresponding transition of the DSPN introduced in Figure 4. Furthermore, depending on the number of tokens in place Download documents, the load-dependent delays of the deterministic transitions Delay for downloading a text and Delay for downloading an image are also proportionally greater than in case of no prefetching activities. In order to avoid network congestion, prefetching documents is disabled when the number of queued requests (i.e., the number of tokens in place Queued requests) is greater than the threshold value. In the DSPN, we consider a threshold value of. This is modeled by an inhibitor arc with corresponding multiplicity from place Queued requests to Allocate bandwidth. 3.4 Partitioned Proxy Cache with and without Prefetching We consider a fixed partitioned proxy cache that may hold up to 3M 7 image and M 7 text documents. Since we consider a workload comprising of 2/3 image and 1/3 text documents, we assume that this partition is optimal. A DSPN of this proxy server architecture with partitioned cache is shown in Figure 6. As before, all places and transitions are labeled. Note that the DSPN is very similar to the DSPN of Figure 4. The main difference constitute the removal of the subnet comprising of the places Text buffer and Image buffer together with the immediate transitions Replace text with image and Replace image with text. Consequently, the probabilities for resolving the conflict between the immediate transitions Hit in proxy cache and Miss in proxy cache is fixed for a given cache size and partition rather than depending on the current number of cached text and image documents. Extending the DSPN of Figure 6 by the subnet modeling prefetching introduced in Figure 5, we obtain a DSPN for a partitioned proxy cache architecture with prefetching. 4 Performance Results For a comparative performance analysis of the Web proxy server cache architectures, we consider a system with 50 clients and 50 proxy cache units. Recall that text and image documents require 1 and 3 units, respectively. We assume that the overall workload comprises of 33.33% requests for image and 66.66% requests for text documents. A similar traffic pattern has been measured e.g., for the Web traffic in the Gigabit Testbed West operated by the Deutsche Forschungsnetz Verein. Since in this study we are interested in the sensitivity of proxy cache performance to workload parameters rather than absolute performance for specific workloads, the generation of client requests is represented by a

8 Latency in sec /110 1/100 1/90 1/80 1/70 1/60 1/50 No P.C. Shared P.C. Shared Prefetch P.C. Partitioned P.C. Partitioned Prefetch P.C. 1/40 1/30 1/ 1/10 Traffic intensity Figure 7. Average latency versus traffic intensity Latency in sec No P.C. Shared P.C. Shared Prefetch P.C. Partitioned P.C. Partitioned Prefetch P.C. 0 1/1 2/1 3/1 4/1 5/1 6/1 7/1 8/1 9/1 10/1 Degree of burstiness Figure 8. Average latency versus degree of burstiness

9 80 70 Latency in sec No P.C. Shared P.C. Shared Prefetch P.C. Partitioned P.C. Partitioned Prefetch P.C /22 1/ 1/18 1/16 1/14 1/12 1/10 1/8 1/6 1/4 1/2 Burstiness frequency Figure 9. Average latency versus burst frequency Latency in sec No P.C. Shared P.C. Shared Prefetch P.C. Partitioned P.C. Partitioned Prefetch P.C Cache size Figure 10. Average latency versus cache size

10 Latency in sec Document Transmission Delay in sec No P.C. Shared P.C. Shared Prefetch P.C. Partitioned P.C. Partition Prefetch P.C. Figure 11. Average latency versus transmission delay 80 Latency in sec No P.C. Shared P.C. Shared Prefetch P.C. Partitioned P. C. Partitioned Prefetch P.C Number of Text Documents Figure 12. Average latency versus number of text documents used in the partitioned proxy cache

11 Markov modulated Poisson process comprising only of two states: bursty arrivals and normal arrivals. That is, we evaluate the DSPN for marking parameter N = 1. The performance curves presented below have been obtained by computing the steadystate solutions of the DSPN with the analysis tool DSPNexpress [9]. The solution of each DSPN requires only few minutes of CPU time for a single parameter setting on a modern workstation. Thus, the presented stochastic modeling approach requires substantially less computational effort than conducting a trace-driven simulation study. As performance measure, we consider the mean latency that an end-user experiences when receiving a document, denoted by L. Note that the mean number of pending client requests as well as the effective mean arrival rate of client request can be directly derived from the DSPN of Figure 4 to 6. Since we assume that the system is in steady state, we can apply Little's Law for deriving the average latency L. That is: L = 0N E{ # Clients} 5 X: Generationof request? In this formula, E{.} and X{.} denotes the mean number of tokens in the corresponding place of a DSPN in steady state and the throughput of the corresponding timed transition, respectively. Other performance measures such as the number of requests that reach servers and the volume of network traffic resulting from document requests can also be directly derived from the steady-state marking probabilities of the DSPN without additional computational cost. Figure 7 to 12 present performance results for the Web proxy server cache architectures described in Section 3. In each figure, a corresponding curve for a simple Web server without a proxy cache is included for comparison. In a first set of experiments, the cache size is kept fixed to M = 50 and the document transfer time is set to their base values. Figure 7 plots curves for the average end user latency versus the traffic intensity for a fixed burst frequency and degree of burstiness. Figure 8 and 9 plot corresponding curves in which the traffic intensity is kept fixed and the degree of burstiness and burst frequency is varied, respectively. In a second experiment, we keep the workload fixed to their base values given in Table 1 and vary the cache size and network bandwidth (i.e., the transmission times for text and image documents). Figure 10 plots curves of the average end user latency for increasing cache size. In this figure, obviously the curve for no proxy server is a straight line. Figure 11 plots curves showing the sensitivity of the average end user latency to the network bandwidth. Note that the x-axis of Figure 11 is labeled with the transmission delay of text documents. Since we assume that image documents have three times the size of a text document, their transmission delay is varied accordingly. Figures 7 to 11 show that the partitioned proxy cache with and without prefetching always performs better than the corresponding shared proxy cache. Furthermore, the inclusion of prefetching improves proxy cache performance if the traffic intensity is below the threshold value. Obviously, the internet without proxy server cache performs considerably worse than a corresponding environment with proxy cache. Recall that we considered a proxy server cache partition optimized for a given workload (i.e., for known percentages of image and text documents). Thus, this observation itself is not very surprising. Subsequently, in a third experiment we explore the impact of choosing the "right" partition of the proxy cache to the performance. Figure 12 plots the average end user delay versus ten feasible partitions of the proxy cache. Recall that the proxy cache has a size of 50 units; a text requires 1 unit and an image 3 units. We observe that only for three out of the ten partitions considered in Figure 12 (i.e., for 2 texts and 16 images, for 8 texts and 14 images, and for 14 texts and 12 images) the partitioned proxy server cache performs better than the shared proxy server cache. Obviously, the curves for the shared proxy cache with and without prefetching are straight lines in Figure 12. To summarize, we also observe that the performance difference between the shared proxy cache and the partitioned proxy cache is most sensitive to network bandwidth. For the partitioned proxy cache architecture, the second most sensitive quantity constitutes the selection of the fixed partition that is best suited for a given workload. Furthermore, as expected the traffic intensity; i.e., the rate at which clients generate requests has considerable impact on the end user delay. The performance difference between shared proxy cache and partitioned proxy cache remains almost constant for increasing degree of burstiness and burst frequency. Moreover, increasing the cache size while substantially decreasing the end user latency, leads only to a small performance gain for the partitioned proxy cache over the shared proxy cache architecture. Conclusions The paper presented deterministic and stochastic Petri net models (DSPN) for two Web proxy cache architectures: a shared cache and a partitioned cache with and without prefetching documents. The presented DSPN models address in particular the sensitivity of the end user latency on the workload (i.e., traffic intensity, degree of burstiness and burst frequency of client requests) as well as on the cache size and network bandwidth. The quantitative analysis of the presented DSPN requires only a few minutes of CPU time on a modern workstation; i.e.,

12 substantially less computational effort than the trace-driven simulation study presented in [13] whereas the same qualitative results have been derived for shared versus partitioned proxy cache without prefetching. Thus, the presented DSPN models are well suited for exploring the entire design space in early design stages for Web proxy server cache architectures. Our performance study shows that for a given workload (i.e., known percentages of image and text documents) one could derive a fixed partition of the proxy cache that optimizes performance. Thus, the development of a proxy server cache architecture that will be able to dynamically partition its cache depending on the actual workload would be highly desirable. A way towards solving this task constitutes the derivation of a working set model known from virtual memory in operating systems for Web server proxy caching. In this study we investigated the sensitivity of proxy cache performance to workload parameters rather than absolute performance for specific workloads. After measurements currently under way for multimedia applications and subsequent statistical analysis has been completed, the DSPN will be utilized for a performance study of Web proxy server cache architectures running under particular workloads. References [1] M. Ajmone Marsan and G. Chiola, On Petri Nets with Deterministic and Exponentially Distributed Firing Times, in: G. Rozenberg (Ed.) Advances in Petri Nets 1987, Lecture Notes in Computer Science 266, , Springer [2] M. Arlitt, R. Friedrich, and T. Jin, Performance Evaluation of Web Proxy Cache Replacement Policies, Proc. 10th Int. Conf. on Modeling Techniques and Tools for Computer Performance Evaluation, Palma de Mallorca, Spain, 193-6, [3] M. Arlitt and C. Williamson, Internet Web Servers: Workload Characterization and Performance Implications, IEEE/ACM Trans. on Networking, 5, , [4] M. Crovella and A. Bestavros, Self-Similiarity in World Wide Web Traffic: Evidence and Possible Causes, IEEE/ACM Trans. on Networking, 5, , [5] B. Duska, D. Marwood, and M. Feeley, The Measured Access Characteristics of World Wide Web Client Proxy Caches, Proc. USENIX Symp on Internet Technologies and Systems, Monterey California, 23-35, [6] A. Feldman, R. Caceres, F. Douglis, G. Glass, and M. Rabinovich, Performance of Web Proxy Caching in Heterogeneous Bandwidth Environments, Technical Report AT&T, January [7] H. Foxwell, and D. A. Menasce, Prefetching Results of Web Searches, Proc. of the 1998 Computer Measurement Group Conference, Anaheim, California, [8] Th. Kroeger, D. Long, and J. Mogul, Exploring the Bounds of Web Latency Reduction from Caching and Prefetching, Proc. USENIX Symp on Internet Technologies and Systems, Monterey California, 13-22, [9] Ch. Lindemann, Performance Modelling with Deterministic and Stochastic Petri Nets, John Wiley & Sons [10] Ch. Lindemann and G.S. Shedler, Numerical Analysis of Deterministic and Stochastic Petri Nets with Concurrent Deterministic Transitions, Performance Evaluation, Special Issue Proc. of PERFORMANCE '96, 27&28, , [11] Ch. Lindemann and A. Thümmler, Transient Analysis of Deterministic and Stochastic Petri Nets with Concurrent Deterministic Transitions, Performance Evaluation, Special Issue Proc. of PERFORMANCE '99, to appear. [12] A. Luotonen, Web Proxy Servers, Prentice Hall [13] S. Williams, M. Abrams, C. Standridge, G. Abdulla, and E. Fox, Removal Policies in Network Caches for World Wide Web Documents, Proc. ACM SIGCOMM 96, Stanford California, , [14] N. Yeager and R. McGrath, Web Server Technology, Morgan Kaufmann, 1996.

Evaluating the Impact of Different Document Types on the Performance of Web Cache Replacement Schemes *

Evaluating the Impact of Different Document Types on the Performance of Web Cache Replacement Schemes * Evaluating the Impact of Different Document Types on the Performance of Web Cache Replacement Schemes * Christoph Lindemann and Oliver P. Waldhorst University of Dortmund Department of Computer Science

More information

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers Proceeding of the 9th WSEAS Int. Conference on Data Networks, Communications, Computers, Trinidad and Tobago, November 5-7, 2007 378 Trace Driven Simulation of GDSF# and Existing Caching Algorithms for

More information

PETRI NET MODELLING OF CONCURRENCY CONTROL IN DISTRIBUTED DATABASE SYSTEM

PETRI NET MODELLING OF CONCURRENCY CONTROL IN DISTRIBUTED DATABASE SYSTEM PETRI NET MODELLING OF CONCURRENCY CONTROL IN DISTRIBUTED DATABASE SYSTEM Djoko Haryono, Jimmy Tirtawangsa, Bayu Erfianto Abstract- The life time of transaction is divided into two stages: executing stage

More information

A queueing network model to study Proxy Cache Servers

A queueing network model to study Proxy Cache Servers Proceedings of the 7 th International Conference on Applied Informatics Eger, Hungary, January 28 31, 2007. Vol. 1. pp. 203 210. A queueing network model to study Proxy Cache Servers Tamás Bérczes, János

More information

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012 Queuing Systems Queuing theory establishes a powerful tool in modeling and performance analysis of many complex systems, such as computer networks, telecommunication systems, call centers, manufacturing

More information

Petri Nets ee249 Fall 2000

Petri Nets ee249 Fall 2000 Petri Nets ee249 Fall 2000 Marco Sgroi Most slides borrowed from Luciano Lavagno s lecture ee249 (1998) 1 Models Of Computation for reactive systems Main MOCs: Communicating Finite State Machines Dataflow

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

Stochastic Petri nets

Stochastic Petri nets Stochastic Petri nets 1 Stochastic Petri nets Markov Chain grows very fast with the dimension of the system Petri nets: High-level specification formalism Markovian Stochastic Petri nets adding temporal

More information

Timed Petri Nets in Modeling and Analysis of Cluster Tools

Timed Petri Nets in Modeling and Analysis of Cluster Tools 562 IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 17, NO. 5, OCTOBER 2001 Timed Petri Nets in Modeling and Analysis of Cluster Tools Wlodek M. Zuberek Abstract Timed Petri nets are used as models

More information

Statistical Testing of Software Based on a Usage Model

Statistical Testing of Software Based on a Usage Model SOFTWARE PRACTICE AND EXPERIENCE, VOL. 25(1), 97 108 (JANUARY 1995) Statistical Testing of Software Based on a Usage Model gwendolyn h. walton, j. h. poore and carmen j. trammell Department of Computer

More information

Outline. Petri nets. Introduction Examples Properties Analysis techniques. 1 EE249Fall04

Outline. Petri nets. Introduction Examples Properties Analysis techniques. 1 EE249Fall04 Outline Petri nets Introduction Examples Properties Analysis techniques 1 Petri Nets (PNs) Model introduced by C.A. Petri in 1962 Ph.D. Thesis: Communication with Automata Applications: distributed computing,

More information

A Quality of Service Decision Model for ATM-LAN/MAN Interconnection

A Quality of Service Decision Model for ATM-LAN/MAN Interconnection A Quality of Service Decision for ATM-LAN/MAN Interconnection N. Davies, P. Francis-Cobley Department of Computer Science, University of Bristol Introduction With ATM networks now coming of age, there

More information

Characterizing Home Pages 1

Characterizing Home Pages 1 Characterizing Home Pages 1 Xubin He and Qing Yang Dept. of Electrical and Computer Engineering University of Rhode Island Kingston, RI 881, USA Abstract Home pages are very important for any successful

More information

A New Web Cache Replacement Algorithm 1

A New Web Cache Replacement Algorithm 1 A New Web Cache Replacement Algorithm Anupam Bhattacharjee, Biolob Kumar Debnath Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Dhaka-, Bangladesh

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

Process- Concept &Process Scheduling OPERATING SYSTEMS

Process- Concept &Process Scheduling OPERATING SYSTEMS OPERATING SYSTEMS Prescribed Text Book Operating System Principles, Seventh Edition By Abraham Silberschatz, Peter Baer Galvin and Greg Gagne PROCESS MANAGEMENT Current day computer systems allow multiple

More information

Transient Analysis Of Stochastic Petri Nets With Interval Decision Diagrams

Transient Analysis Of Stochastic Petri Nets With Interval Decision Diagrams Transient Analysis Of Stochastic Petri Nets With Interval Decision Diagrams Martin Schwarick ms@informatik.tu-cottbus.de Brandenburg University of Technology Cottbus, Germany Abstract. This paper presents

More information

OPTIMIZING PRODUCTION WORK FLOW USING OPEMCSS. John R. Clymer

OPTIMIZING PRODUCTION WORK FLOW USING OPEMCSS. John R. Clymer Proceedings of the 2000 Winter Simulation Conference J. A. Joines, R. R. Barton, K. Kang, and P. A. Fishwick, eds. OPTIMIZING PRODUCTION WORK FLOW USING OPEMCSS John R. Clymer Applied Research Center for

More information

Petri Nets ~------~ R-ES-O---N-A-N-C-E-I--se-p-te-m--be-r Applications.

Petri Nets ~------~ R-ES-O---N-A-N-C-E-I--se-p-te-m--be-r Applications. Petri Nets 2. Applications Y Narahari Y Narahari is currently an Associate Professor of Computer Science and Automation at the Indian Institute of Science, Bangalore. His research interests are broadly

More information

Contents Introduction Petri Net Toolbox at a First Glance... 4

Contents Introduction Petri Net Toolbox at a First Glance... 4 Learning about Petri Ne t Toolbox For Use with MATLAB Version 2.1 Mihaela-Hanako Matcovschi Cristian Mahulea Octavian Pastravanu 2005 Contents Contents... 2 Introduction Petri Net Toolbox at a First Glance...

More information

Safety and Reliability of Embedded Systems. (Sicherheit und Zuverlässigkeit eingebetteter Systeme) Safety and Reliability Analysis Models: Overview

Safety and Reliability of Embedded Systems. (Sicherheit und Zuverlässigkeit eingebetteter Systeme) Safety and Reliability Analysis Models: Overview (Sicherheit und Zuverlässigkeit eingebetteter Systeme) Safety and Reliability Analysis Models: Overview Content Classification Hazard and Operability Study (HAZOP) Preliminary Hazard Analysis (PHA) Event

More information

HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM. Janetta Culita, Simona Caramihai, Calin Munteanu

HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM. Janetta Culita, Simona Caramihai, Calin Munteanu HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM Janetta Culita, Simona Caramihai, Calin Munteanu Politehnica University of Bucharest Dept. of Automatic Control and Computer Science E-mail: jculita@yahoo.com,

More information

A New Call Admission Control scheme for Real-time traffic in Wireless Networks

A New Call Admission Control scheme for Real-time traffic in Wireless Networks A New Call Admission Control scheme for Real-time traffic in Wireless Networks Maneesh Tewari and H.S. Jamadagni Center for Electronics Design and Technology, Indian Institute of Science, Bangalore, 5612

More information

Modular Petri Net Processor for Embedded Systems

Modular Petri Net Processor for Embedded Systems Modular Petri Net Processor for Embedded Systems Orlando Micolini 1, Emiliano N. Daniele, Luis O. Ventre Laboratorio de Arquitectura de Computadoras (LAC) FCEFyN Universidad Nacional de Córdoba orlando.micolini@unc.edu.ar,

More information

Dependable and Secure Systems Dependability

Dependable and Secure Systems Dependability Dependable and Secure Systems Dependability Master of Science in Embedded Computing Systems Quantitative Dependability Analysis with Stochastic Activity Networks: the Möbius Tool Andrea Domenici DII, Università

More information

Week 7: Traffic Models and QoS

Week 7: Traffic Models and QoS Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,

More information

Introduction to Modeling. Lecture Overview

Introduction to Modeling. Lecture Overview Lecture Overview What is a Model? Uses of Modeling The Modeling Process Pose the Question Define the Abstractions Create the Model Analyze the Data Model Representations * Queuing Models * Petri Nets *

More information

Stochastic Petri Nets Supporting Dynamic Reliability Evaluation

Stochastic Petri Nets Supporting Dynamic Reliability Evaluation International Journal of Materials & Structural Reliability Vol.4, No.1, March 2006, 65-77 International Journal of Materials & Structural Reliability Stochastic Petri Nets Supporting Dynamic Reliability

More information

An Efficient Web Cache Replacement Policy

An Efficient Web Cache Replacement Policy In the Proc. of the 9th Intl. Symp. on High Performance Computing (HiPC-3), Hyderabad, India, Dec. 23. An Efficient Web Cache Replacement Policy A. Radhika Sarma and R. Govindarajan Supercomputer Education

More information

Active Queue Management for Self-Similar Network Traffic

Active Queue Management for Self-Similar Network Traffic Active Queue Management for Self-Similar Network Traffic Farnaz Amin*, Kiarash Mizanain**, and Ghasem Mirjalily*** * Electrical Engineering and computer science Department, Yazd University, farnaz.amin@stu.yazduni.ac.ir

More information

Performance Analysis of Time-enhanced UML Diagrams Based on Stochastic Processes

Performance Analysis of Time-enhanced UML Diagrams Based on Stochastic Processes n Proc. 3 rd nt. Workshop on Software and Performance (WOSP), Rome, taly, July 2002 (to appear) Performance Analysis of Time-enhanced UML Diagrams Based on Stochastic Processes Christoph Lindemann, Axel

More information

Performance Modeling of Proxy Cache Servers

Performance Modeling of Proxy Cache Servers Journal of Universal Computer Science, vol. 2, no. 9 (2006), 39-53 submitted: 3/2/05, accepted: 2/5/06, appeared: 28/9/06 J.UCS Performance Modeling of Proxy Cache Servers Tamás Bérczes, János Sztrik (Department

More information

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 2, APRIL Segment-Based Streaming Media Proxy: Modeling and Optimization

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 2, APRIL Segment-Based Streaming Media Proxy: Modeling and Optimization IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 2, APRIL 2006 243 Segment-Based Streaming Media Proxy: Modeling Optimization Songqing Chen, Member, IEEE, Bo Shen, Senior Member, IEEE, Susie Wee, Xiaodong

More information

Performance Modeling and Evaluation of Web Systems with Proxy Caching

Performance Modeling and Evaluation of Web Systems with Proxy Caching Performance Modeling and Evaluation of Web Systems with Proxy Caching Yasuyuki FUJITA, Masayuki MURATA and Hideo MIYAHARA a a Department of Infomatics and Mathematical Science Graduate School of Engineering

More information

Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation

Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation Leah Rosenbaum Mohit Agrawal Leah Birch Yacoub Kureh Nam Lee UCLA Institute for Pure and Applied

More information

BUFFER STOCKS IN KANBAN CONTROLLED (TRADITIONAL) UNSATURATED MULTI-STAGE PRODUCTION SYSTEM

BUFFER STOCKS IN KANBAN CONTROLLED (TRADITIONAL) UNSATURATED MULTI-STAGE PRODUCTION SYSTEM VOL. 3, NO., FEBRUARY 008 ISSN 89-6608 006-008 Asian Research Publishing Network (ARPN). All rights reserved. BUFFER STOCKS IN KANBAN CONTROLLED (TRADITIONAL) UNSATURATED MULTI-STAGE PRODUCTION SYSTEM

More information

Análise e Modelagem de Desempenho de Sistemas de Computação: Component Level Performance Models of Computer Systems

Análise e Modelagem de Desempenho de Sistemas de Computação: Component Level Performance Models of Computer Systems Análise e Modelagem de Desempenho de Sistemas de Computação: Component Level Performance Models of Computer Systems Virgilio ili A. F. Almeida 1 o Semestre de 2009 Introdução: Semana 5 Computer Science

More information

Dependable and Secure Systems Dependability Master of Science in Embedded Computing Systems

Dependable and Secure Systems Dependability Master of Science in Embedded Computing Systems Dependable and Secure Systems Dependability Master of Science in Embedded Computing Systems Quantitative Dependability Analysis with Stochastic Activity Networks: the Möbius Tool April 2016 Andrea Domenici

More information

An Approach for Enhanced Performance of Packet Transmission over Packet Switched Network

An Approach for Enhanced Performance of Packet Transmission over Packet Switched Network ISSN (e): 2250 3005 Volume, 06 Issue, 04 April 2016 International Journal of Computational Engineering Research (IJCER) An Approach for Enhanced Performance of Packet Transmission over Packet Switched

More information

MANAGEMENT SCIENCE doi /mnsc ec pp. ec1 ec12

MANAGEMENT SCIENCE doi /mnsc ec pp. ec1 ec12 MANAGEMENT SCIENCE doi 0.87/mnsc.080.0875ec pp. ec ec e-companion ONLY AVAILABLE IN ELECTRONIC FORM informs 008 INFORMS Electronic Companion Service Adoption and Pricing of Content Delivery Network (CDN)

More information

Dynamic Broadcast Scheduling in DDBMS

Dynamic Broadcast Scheduling in DDBMS Dynamic Broadcast Scheduling in DDBMS Babu Santhalingam #1, C.Gunasekar #2, K.Jayakumar #3 #1 Asst. Professor, Computer Science and Applications Department, SCSVMV University, Kanchipuram, India, #2 Research

More information

A Capacity Planning Methodology for Distributed E-Commerce Applications

A Capacity Planning Methodology for Distributed E-Commerce Applications A Capacity Planning Methodology for Distributed E-Commerce Applications I. Introduction Most of today s e-commerce environments are based on distributed, multi-tiered, component-based architectures. The

More information

On the Relationship of Server Disk Workloads and Client File Requests

On the Relationship of Server Disk Workloads and Client File Requests On the Relationship of Server Workloads and Client File Requests John R. Heath Department of Computer Science University of Southern Maine Portland, Maine 43 Stephen A.R. Houser University Computing Technologies

More information

The Impact of Write Back on Cache Performance

The Impact of Write Back on Cache Performance The Impact of Write Back on Cache Performance Daniel Kroening and Silvia M. Mueller Computer Science Department Universitaet des Saarlandes, 66123 Saarbruecken, Germany email: kroening@handshake.de, smueller@cs.uni-sb.de,

More information

A Brief Introduction to Coloured Petri Nets

A Brief Introduction to Coloured Petri Nets A Brief Introduction to Coloured Petri Nets Kurt Jensen Computer Science Department, University of Aarhus NyMunkegade, Bldg. 540, DK-8000 AarhusC, Denmark E-mml: kjensen9 WWV~: http://www.daimi.aau.dk/~kjensen/

More information

Evaluating the GPRS Radio Interface for Different Quality of Service Profiles

Evaluating the GPRS Radio Interface for Different Quality of Service Profiles Evaluating the GPRS Radio Interface for Different Quality of Service Profiles Christoph Lindemann and Axel Thümmler University of Dortmund Department of Computer Science August-Schmidt-Str. 12 44227 Dortmund,

More information

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please

More information

A model for the evaluation of storage hierarchies

A model for the evaluation of storage hierarchies ~ The The design of the storage component is essential to the achieving of a good overall cost-performance balance in a computing system. A method is presented for quickly assessing many of the technological

More information

A New Statistical Procedure for Validation of Simulation and Stochastic Models

A New Statistical Procedure for Validation of Simulation and Stochastic Models Syracuse University SURFACE Electrical Engineering and Computer Science L.C. Smith College of Engineering and Computer Science 11-18-2010 A New Statistical Procedure for Validation of Simulation and Stochastic

More information

Implementation and modeling of two-phase locking concurrency control a performance study

Implementation and modeling of two-phase locking concurrency control a performance study INFSOF 4047 Information and Software Technology 42 (2000) 257 273 www.elsevier.nl/locate/infsof Implementation and modeling of two-phase locking concurrency control a performance study N.B. Al-Jumah a,

More information

Visualization of Internet Traffic Features

Visualization of Internet Traffic Features Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,

More information

ON-LINE QUALITATIVE MODEL-BASED DIAGNOSIS OF TECHNOLOGICAL SYSTEMS USING COLORED PETRI NETS

ON-LINE QUALITATIVE MODEL-BASED DIAGNOSIS OF TECHNOLOGICAL SYSTEMS USING COLORED PETRI NETS ON-LINE QUALITATIVE MODEL-BASED DIAGNOSIS OF TECHNOLOGICAL SYSTEMS USING COLORED PETRI NETS Adrien Leitold 1 Miklós Gerzson 2 Anna I. Pózna 2 and Katalin M. Hangos 2,3 1 Department of Mathematics 3 Process

More information

Chapter The LRU* WWW proxy cache document replacement algorithm

Chapter The LRU* WWW proxy cache document replacement algorithm Chapter The LRU* WWW proxy cache document replacement algorithm Chung-yi Chang, The Waikato Polytechnic, Hamilton, New Zealand, itjlc@twp.ac.nz Tony McGregor, University of Waikato, Hamilton, New Zealand,

More information

A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES

A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES A CONTENT-TYPE BASED EVALUATION OF WEB CACHE REPLACEMENT POLICIES F.J. González-Cañete, E. Casilari, A. Triviño-Cabrera Department of Electronic Technology, University of Málaga, Spain University of Málaga,

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

CS370: System Architecture & Software [Fall 2014] Dept. Of Computer Science, Colorado State University

CS370: System Architecture & Software [Fall 2014] Dept. Of Computer Science, Colorado State University Frequently asked questions from the previous class survey CS 370: SYSTEM ARCHITECTURE & SOFTWARE [CPU SCHEDULING] Shrideep Pallickara Computer Science Colorado State University OpenMP compiler directives

More information

Shaping Process Semantics

Shaping Process Semantics Shaping Process Semantics [Extended Abstract] Christoph M. Kirsch Harald Röck Department of Computer Sciences University of Salzburg, Austria {ck,hroeck}@cs.uni-salzburg.at Analysis. Composition of virtually

More information

Characterizing Document Types to Evaluate Web Cache Replacement Policies

Characterizing Document Types to Evaluate Web Cache Replacement Policies Characterizing Document Types to Evaluate Web Cache Replacement Policies F.J. Gonzalez-Cañete, E. Casilari, Alicia Triviño-Cabrera Dpto. Tecnología Electrónica, Universidad de Málaga, E.T.S.I. Telecomunicación,

More information

Conventionel versus Petri Net Modeling of a Transport Process in Postal Automation

Conventionel versus Petri Net Modeling of a Transport Process in Postal Automation Conventionel versus Petri Net Modeling of a Transport Process in Postal Automation Boris Lohmann University of Bremen, Institut für Automatisierungstechnik, NW1, D-28359 Bremen e-mail: Lohmann@tum.de,

More information

Modeling and Performance Evaluation of ATM Switches

Modeling and Performance Evaluation of ATM Switches Modeling and Performance Evaluation of ATM Switches KHALIL SHIHAB Department of Computer Science, Sultan Qaboos University, P.O. Box 36, Al-Khod 123, Oman Abstract: - In this work, we present a Colored

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing 244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service

More information

Performance Testing from UML Models with Resource Descriptions *

Performance Testing from UML Models with Resource Descriptions * Performance Testing from UML Models with Resource Descriptions * Flávio M. de Oliveira 1, Rômulo da S. Menna 1, Hugo V. Vieira 1, Duncan D.A. Ruiz 1 1 Faculdade de Informática Pontifícia Universidade Católica

More information

Introduction to Electronic Design Automation. Model of Computation. Model of Computation. Model of Computation

Introduction to Electronic Design Automation. Model of Computation. Model of Computation. Model of Computation Introduction to Electronic Design Automation Model of Computation Jie-Hong Roland Jiang 江介宏 Department of Electrical Engineering National Taiwan University Spring 03 Model of Computation In system design,

More information

Simulation Studies of the Basic Packet Routing Problem

Simulation Studies of the Basic Packet Routing Problem Simulation Studies of the Basic Packet Routing Problem Author: Elena Sirén 48314u Supervisor: Pasi Lassila February 6, 2001 1 Abstract In this paper the simulation of a basic packet routing problem using

More information

WEEK 5 - APPLICATION OF PETRI NETS. 4.4 Producers-consumers problem with priority

WEEK 5 - APPLICATION OF PETRI NETS. 4.4 Producers-consumers problem with priority 4.4 Producers-consumers problem with priority The net shown in Fig. 27 represents a producers-consumers system with priority, i.e., consumer A has priority over consumer B in the sense that A can consume

More information

Queuing Networks. Renato Lo Cigno. Simulation and Performance Evaluation Queuing Networks - Renato Lo Cigno 1

Queuing Networks. Renato Lo Cigno. Simulation and Performance Evaluation Queuing Networks - Renato Lo Cigno 1 Queuing Networks Renato Lo Cigno Simulation and Performance Evaluation 2014-15 Queuing Networks - Renato Lo Cigno 1 Moving between Queues Queuing Networks - Renato Lo Cigno - Interconnecting Queues 2 Moving

More information

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup Chapter 4 Routers with Tiny Buffers: Experiments This chapter describes two sets of experiments with tiny buffers in networks: one in a testbed and the other in a real network over the Internet2 1 backbone.

More information

Performance Analysis of WLANs Under Sporadic Traffic

Performance Analysis of WLANs Under Sporadic Traffic Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs

More information

Methods of Technical Risk Assessment in a Regional Context

Methods of Technical Risk Assessment in a Regional Context Methods of Technical Risk Assessment in a Regional Context Wolfgang Kröger, Professor and Head of former Laboratory for Safety Analysis (www.lsa.ethz.ch) Founding Rector of International Risk Governance

More information

Discrete Event Simulation and Petri net Modeling for Reliability Analysis

Discrete Event Simulation and Petri net Modeling for Reliability Analysis Discrete Event Simulation and Petri net Modeling for Reliability Analysis * Behrouz Safarinejadian Shiraz University of Technology, safarinejad@sutech.ac.ir Abstract. Analytical methods in reliability

More information

Iterative Specification Refinement in Deriving Logic Controllers

Iterative Specification Refinement in Deriving Logic Controllers 17 th European Symposium on Computer Aided Process Engineering ESCAPE17 V. Plesu and P.S. Agachi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Iterative Specification Refinement in Deriving Logic

More information

Buffer Management for Self-Similar Network Traffic

Buffer Management for Self-Similar Network Traffic Buffer Management for Self-Similar Network Traffic Faranz Amin Electrical Engineering and computer science Department Yazd University Yazd, Iran farnaz.amin@stu.yazd.ac.ir Kiarash Mizanian Electrical Engineering

More information

Dynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks *

Dynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks * Dynamic Control and Optimization of for Short Message Transfer in GPRS/UMTS Networks * Michael M. Markou and Christos G. Panayiotou Dept. of Electrical and Computer Engineering, University of Cyprus Email:

More information

Stochastic Petri Net Analysis of Deadlock Detection Algorithms in Transaction Database Systems with Dynamic Locking

Stochastic Petri Net Analysis of Deadlock Detection Algorithms in Transaction Database Systems with Dynamic Locking Stochastic Petri Net Analysis of Deadlock Detection Algorithms in Transaction Database Systems with Dynamic Locking I NG-RAY CHEN Institute of Information Engineering, National Cheng Kung University, No.

More information

arxiv: v3 [cs.ni] 3 May 2017

arxiv: v3 [cs.ni] 3 May 2017 Modeling Request Patterns in VoD Services with Recommendation Systems Samarth Gupta and Sharayu Moharir arxiv:1609.02391v3 [cs.ni] 3 May 2017 Department of Electrical Engineering, Indian Institute of Technology

More information

Integration of analytic model and simulation model for analysis on system survivability

Integration of analytic model and simulation model for analysis on system survivability 6 Integration of analytic model and simulation model for analysis on system survivability Jang Se Lee Department of Computer Engineering, Korea Maritime and Ocean University, Busan, Korea Summary The objective

More information

Transactions on Information and Communications Technologies vol 3, 1993 WIT Press, ISSN

Transactions on Information and Communications Technologies vol 3, 1993 WIT Press,   ISSN The implementation of a general purpose FORTRAN harness for an arbitrary network of transputers for computational fluid dynamics J. Mushtaq, A.J. Davies D.J. Morgan ABSTRACT Many Computational Fluid Dynamics

More information

Key words: IP router, Differentiated services, QoS, Custom Queuing, Priority Queuing. 1. INTRODUCTION

Key words: IP router, Differentiated services, QoS, Custom Queuing, Priority Queuing. 1. INTRODUCTION OPNET Modeling of an IP Router with Scheduling Algorithms to Implement Differentiated Services Hiroshi Yamada NTT Service Integration Laboratories, Communication Traffic Project, Traffic Solution Group

More information

International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015)

International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) A Cross Traffic Estimate Model for Optical Burst Switching Networks Yujue WANG 1, Dawei NIU 2, b,

More information

Congestion Control in Datacenters. Ahmed Saeed

Congestion Control in Datacenters. Ahmed Saeed Congestion Control in Datacenters Ahmed Saeed What is a Datacenter? Tens of thousands of machines in the same building (or adjacent buildings) Hundreds of switches connecting all machines What is a Datacenter?

More information

THE TCP specification that specifies the first original

THE TCP specification that specifies the first original 1 Median Filtering Simulation of Bursty Traffic Auc Fai Chan, John Leis Faculty of Engineering and Surveying University of Southern Queensland Toowoomba Queensland 4350 Abstract The estimation of Retransmission

More information

Introduction: Two motivating examples for the analytical approach

Introduction: Two motivating examples for the analytical approach Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline

More information

PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS

PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS THE UNIVERSITY OF NAIROBI DEPARTMENT OF ELECTRICAL AND INFORMATION ENGINEERING FINAL YEAR PROJECT. PROJECT NO. 60 PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS OMARI JAPHETH N. F17/2157/2004 SUPERVISOR:

More information

Popularity-Based PPM: An Effective Web Prefetching Technique for High Accuracy and Low Storage

Popularity-Based PPM: An Effective Web Prefetching Technique for High Accuracy and Low Storage Proceedings of 22 International Conference on Parallel Processing, (ICPP 22), Vancouver, Canada, August 18-21, 22. Popularity-Based : An Effective Web Prefetching Technique for High Accuracy and Low Storage

More information

Fluid models for evaluating threshold-based control policies for survivability of a distributed network

Fluid models for evaluating threshold-based control policies for survivability of a distributed network Fluid models for evaluating threshold-based control policies for survivability of a distributed network Vineet Aggarwal ICF Consulting 9 Lee Highway, Fairfax, VA Nataraan Gautam Marcus Department of Industrial

More information

Overview of Dataflow Languages. Waheed Ahmad

Overview of Dataflow Languages. Waheed Ahmad Overview of Dataflow Languages Waheed Ahmad w.ahmad@utwente.nl The purpose of models is not to fit the data but to sharpen the questions. Samuel Karlins 11 th R.A Fisher Memorial Lecture Royal Society

More information

Module 4: Stochastic Activity Networks

Module 4: Stochastic Activity Networks Module 4: Stochastic Activity Networks Module 4, Slide 1 Stochastic Petri nets Session Outline Places, tokens, input / output arcs, transitions Readers / Writers example Stochastic activity networks Input

More information

Managing test suites for services

Managing test suites for services Managing test suites for services Kathrin Kaschner Universität Rostock, Institut für Informatik, 18051 Rostock, Germany kathrin.kaschner@uni-rostock.de Abstract. When developing an existing service further,

More information

VALIDATING AN ANALYTICAL APPROXIMATION THROUGH DISCRETE SIMULATION

VALIDATING AN ANALYTICAL APPROXIMATION THROUGH DISCRETE SIMULATION MATHEMATICAL MODELLING AND SCIENTIFIC COMPUTING, Vol. 8 (997) VALIDATING AN ANALYTICAL APPROXIMATION THROUGH DISCRETE ULATION Jehan-François Pâris Computer Science Department, University of Houston, Houston,

More information

Performance modeling of an Apache web server with bursty arrival traffic

Performance modeling of an Apache web server with bursty arrival traffic Performance modeling of an Apache web server with bursty arrival traffic Andersson, Mikael; Cao, Jianhua; Kihl, Maria; Nyberg, Christian Published in: IC'3 : proceedings of the international conference

More information

Simulation of Petri Nets in Rule-Based Expert System Shell McESE

Simulation of Petri Nets in Rule-Based Expert System Shell McESE Abstract Simulation of Petri Nets in Rule-Based Expert System Shell McESE F. Franek and I. Bruha Dept of Computer Science and Systems, McMaster University Hamilton, Ont., Canada, L8S4K1 Email: {franya

More information

Efficient Randomized Web-Cache Replacement Schemes Using Samples From Past Eviction Times

Efficient Randomized Web-Cache Replacement Schemes Using Samples From Past Eviction Times IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 4, AUGUST 2002 441 Efficient Randomized Web-Cache Replacement Schemes Using Samples From Past Eviction Times Konstantinos Psounis, Student Member, IEEE,

More information

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing Mare Lole and Branko Mikac Department of Telecommunications Faculty of Electrical Engineering and Computing,

More information

Analytic Performance Models for Bounded Queueing Systems

Analytic Performance Models for Bounded Queueing Systems Analytic Performance Models for Bounded Queueing Systems Praveen Krishnamurthy Roger D. Chamberlain Praveen Krishnamurthy and Roger D. Chamberlain, Analytic Performance Models for Bounded Queueing Systems,

More information

INTERNET OVER DIGITAL VIDEO BROADCAST: PERFORMANCE ISSUES

INTERNET OVER DIGITAL VIDEO BROADCAST: PERFORMANCE ISSUES INTERNET OVER DIGITAL VIDEO BROADCAST: PERFORMANCE ISSUES Hakan Yılmaz TÜBİTAK Marmara Research Center Information Technologies Research Institute Kocaeli, Turkey hy@btae.mam.gov.tr Bülent Sankur Boğaziçi

More information

EE249 Discussion Petri Nets: Properties, Analysis and Applications - T. Murata. Chang-Ching Wu 10/9/2007

EE249 Discussion Petri Nets: Properties, Analysis and Applications - T. Murata. Chang-Ching Wu 10/9/2007 EE249 Discussion Petri Nets: Properties, Analysis and Applications - T. Murata Chang-Ching Wu 10/9/2007 What are Petri Nets A graphical & modeling tool. Describe systems that are concurrent, asynchronous,

More information

Petri Nets. Robert A. McGuigan, Department of Mathematics, Westfield State

Petri Nets. Robert A. McGuigan, Department of Mathematics, Westfield State 24 Petri Nets Author: College. Robert A. McGuigan, Department of Mathematics, Westfield State Prerequisites: The prerequisites for this chapter are graphs and digraphs. See Sections 9.1, 9.2, and 10.1

More information